June 26, 2013 // 6:57 pm - Following up on the previous PS3 SDAT / EDAT v3 and v4 Keys, today PlayStation 3 developers flat_z and naehrwert have shared some PS3 3.60+ Loader Keys and Phat HDD Encryption tools (including a full EncDec Emulator to encrypt or decrypt game discs) with details below followed by the Lv1ldr Crypto Keys as well.

Starting with firmware version 3.60 loader keys have been encrypted. Look here for a tool that decrypts them. Besides that, there is an implementation of the cryptographic algorithm which is used to encrypt/decrypt lv1ldr from lv0 and root scramble key at the SPU side.

From naehrwert (cdn0.meme.li/instances/600x600/39151418.jpg): The "Y U NO" picture I posted before

Btw. this means we might know now how cobra and 3k3y got their drive emulators working on latest consoles..

From zecoxao: First thing are the scrambled keys. Sony obfuscated the keys in order to make hard our access to them. those are called scrambled keys. Second thing is hdd encryption by glevand was incomplete. partially because he only had a slim and not a phat. now it's complete. Third thing is supposedly how cobra and 3k3y takes care of the drive keys on newer consoles. they basically don't even grab the keys, and all that's needed are sv_iso keys.

naehrwert already knows how that works. hence that meme. all you need is sv_iso keys lol

I don't know if there's still any interest in this but just in case there is I'll leave a zip file showing how to properly patch lv0 and its inside loaders.. just a warning: this takes a LOT of work to be done.

From eussNL: It will help others to deobfuscate the real keys that in the end are used for making MFWs. Basicly anyone can now decrypt them and with the algo documented publicly that makes it time for Sony to change it or let it rest while giving PS4 attention. And no, we will never be able to get private keys - forget that ever happened in 3.55pre era.

As to the hdd crypto: well, it is about time that not only NOR consoles, but also NAND consoles can benefit from documentation about their encryption. In the longrun that means you could be able to dump your drivekeys and decrypt the hdd on the PC. Of course without keys you cannot get far, to give you an idea:

1. Suppose you can test one key every second
2. for simplicity sake lets pretend the keysize is 0x10

or if you rather count in base10:
1 byte = 256 variants
16 bytes would have
256^16 or
256*256*256*256*256*256*256*256*256*256*256*256*256*256*256*256 or
3.4028237e+38 variants

There are 31556926 seconds in a year taking you 10783127828133147806075110339701 years to check each key variant possible with 0x10 keysize and 1 key per second.

From aldostools: That's correct, but remember that that time is the worst scenario. The same analysis applies for the (dev) klicensee keys used to encrypt EDAT and SELF/SPRX (which have a keysize of 0x10), and the practice shows that it can be bruteforced in less than 1 minute in many cases if a reduced universe of possible keys is available.

From Asure: I guess, you can calculate i.e. brute force the drive key. A device pretends to be the drive, but it can tell when it's not authed. Plugged into your BDROM port, it sits and tries keys until it finds the right one.

I also guess there's not only AUTH_DRIVE_USER but also AUTH_DRIVE_BDROM or similar, and the BDROM AUTH is being abused here

This would also mean you could do the key extraction with a PC or dev board like Arduino, but would require some skilled programmers to whip up a solution. Both available solutions should probably have done it that way. Complete BD drive emulation is not something a programmer just whips up in a day. (Unless everything besides the drive auth&crypt is just standard SATA commands..)

From Abkarino comes the Lv1ldr Crypto Keys and Test Files, as follows:

Hi all, Last night, a lot of great release had been released for public like 3.60+ loader keys and crypto tools that will enable any body to decrypt/encrypt lv1ldr extracted from decrypted lv0. But since this tools still need some keys to work and no body had released this keys yet or it does not published in ps3 dev wiki also, a lovely bird (thanks and credit goes to him) had hinted me about this keys, to allow us to decrypt/re-encrypt the lv1ldr our self like Rebug team for example to make our own CFW.

So i had figured how to use this great tool to decrypt/re-encrypt extracted scrambled and encrypted lv1ldr from lv0 my self. So i had decided to release this keys to help the public to do it them self also. This keys is consist of two sets one for PPU and the other one for SPU.

This file contain an encrypted lv1ldr.self named as lv1ldr-enc extracted from decrypted lv0, this will be decrypted using PPU keys.. and encrypted root scrambling key named as root-key-enc extracted from decrypted lv1ldr.self, this will be decrypted using SPU keys. Just feel free to test it your self and add them to the wiki

Finally, from TehUnkn0wn: I've made a LV0 loader extractor/injector (linked above). The code could be better, but it does its job.